Refine Your Search

Topic

Search Results

Event

Program - 2022 COMVEC™

2024-05-17
The 2022 COMVEC™ technical program focused on the commercial vehicle industry's crucial topics such as electrification, connectivity, off-highway, cybersecurity, autonomous and more!
Event

Health & Safety - 2022 COMVEC™

2024-05-17
The 2022 COMVEC™ technical program focused on the commercial vehicle industry's crucial topics such as electrification, connectivity, off-highway, cybersecurity, autonomous and more!
Event

Hotel & Travel - NAIPC

2024-05-17
The 2022 COMVEC™ technical program focused on the commercial vehicle industry's crucial topics such as electrification, connectivity, off-highway, cybersecurity, autonomous and more!
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2021-12-15
CURRENT
J3061_202112
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. ...Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. ...This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems. This includes: Defining a complete lifecycle process framework that can be tailored and utilized within each organization’s development processes to incorporate Cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning.
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2016-01-14
HISTORICAL
J3061_201601
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. ...Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. ...This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems. This includes: Defining a complete lifecycle process framework that can be tailored and utilized within each organization’s development processes to incorporate Cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning.

Program - 2023 Government Industry Meeting

2024-05-17
Annual conference government policy, regulatory makers, automotive industry neutral forum discuss US government regulation, technology, customer acceptance future vehicle design. industry event safety, emission control, fuel efficiency, automated vehicles.
Event

2022 COMVEC™

2024-05-17
COMVEC™ conference is the only North American event that addresses vehicles and equipment spanning on-highway, off-highway, agricultural, construction, industrial, military, and mining sectors.

SAE EDGE™ Research Reports - Publications

2024-05-17
SAE EDGE Research Reports provide examinations significant topics facing mobility industry today including Connected Automated Vehicle Technologies Electrification Advanced Manufacturing
Technical Paper

Review on CAN Bus Protocol: Attacks, Difficulties, and Potential Solutions

2023-04-11
2023-01-0926
The new generation vehicles these days are managed by networked controllers. A large portion of the networks is planned with more security which has recently roused researchers to exhibit various attacks against the system. This paper talks about the liabilities of the Controller Area Network (CAN) inside In-vehicle communication protocol and a few potentials that could take due advantage of it. Moreover, this paper presents a few security measures proposed in the present examination status to defeat the attacks. In any case, the fundamental objective of this paper is to feature a comprehensive methodology known as Intrusion Detection System (IDS), which has been a significant device in getting network data in systems over many years. To the best of our insight, there is no recorded writing on a through outline of IDS execution explicitly in the CAN transport network system.
Technical Paper

UAS Behaviour and Consistency Monitoring System for Countering Cyber Security Threats

2014-09-16
2014-01-2131
Upon their arrival, Unmanned Autonomous Systems (UAS) brought with them many benefits for those involved in a military campaign. They can use such systems to reconnoiter dangerous areas, provide 24-hr aerial security surveillance for force protection purposes or even attack enemy targets all the while avoiding friendly human losses in the process. Unfortunately, these platforms also carry the inherent risk of being built on innately vulnerable cybernetic systems. From software which can be tampered with to either steal data, damage or even outright steal the aircraft, to the data networks used for communications which can be jammed or even eavesdropped on to gain access to sensible information. All this has the potential to turn the benefits of UAS into liabilities and although the last decade has seen great advances in the development of protection and countermeasures against the described threats and beyond the risk still endures.
Magazine

SAE Truck & Off-Highway Engineering: August 2022

2022-08-04
Deere advances in-field autonomy While stereo cameras and computer vision guide Deere's "limited- release" 8R autonomous tractor, Bear Flag's lidar tech will augment future machines. Positioning to centimeter-level improves agriculture Precision-navigation approaches that emphasize backward compatibility help farms reap more value from autonomous operations. Funding, mandates fuel commercial-vehicle electrification Legislators provide the impetus to electrify trucks and buses, leading to several engineering challenges.
Magazine

Aerospace & Defense Technology: September 2022

2022-09-01
The Sky is No Longer the Limit Celebrating 75 Years of Air Force Technology Air Force Technology Timeline Leveraging New Technologies for Mil/Aero Electronic Systems MOSA Enclosure Design for Military Systems Three Challenges to 5G's Military Success How to Specify and Select RF Filters Investigation of Requirements and Capabilities of Next-Generation Mine Warfare Unmanned Underwater Vehicles Model-based systems engineering (MBSE) tools, including functional flow block diagrams and functional hierarchies, are used to logically define mine countermeasure (MCM) UUV operations and support the development of alternative concepts of operations. On the Pulsed Laser Ablation of Metals and Semiconductors A comparison of effects across disparate experimental regimes through the study of pulsed laser ablation over several orders of magnitude in pulse duration, fluence, and material properties.
Magazine

Aerospace & Defense Technology: April 2023

2023-04-06
Breathing Life into Artificial Intelligence and Next Generation Autonomous Aerospace Systems Robotic Rotational Molding Creates New Opportunities for Military and Aerospace Applications Rim-Driven Electric Aircraft Propulsion High-Speed Midwave Infrared Cameras Enable Military Test Range Tracking System What Today's Advances in Radar Technology Mean for Testing and Training Tackling Ruggedization Challenges for RF Communications in Software Defined Radios AUVSI XPONENTIAL 2023 The Blueprint for Autonomy Multi-Scale Structuring of the Polar Ionosphere Understanding a radically new sensing capability for polar ionospheric science introduced by observational evidence recently provided by the electronically steerable Resolute Bay Incoherent Scatter Radar (RISR). Stepped-Frequency Distributed Radar for Through-the-Wall Sensing A technical analysis of the effectiveness of distributed radar for through-the-wall sensing applications.
Magazine

Aerospace & Defense Technology: August 2020

2020-08-01
Reverse Engineering the Boeing E-3 Sentry's Secondary Flight Controls Vanadium - A Green Metal Critical to Aerospace and Clean Energy Thrust in Space - The Nuances of Thruster Valve Design 3D Printing Aerodynamic Improvements Cryogenic-Capable Isolators Improve the Performance of Millimeter-Wave Systems by Lowering Noise Levels Detection with Quantum Radar A new radar prototype utilizes quantum entanglement as a method of object detection. Preliminary Development of an Integrated Mobility, Lethality, and Survivability Soldier Performance Testing Platform Developing a methodology that incorporates objective measures of performance and is sensitive to changes in soldier-system equipment could help guide equipment manufacturers during product development and acquisition. Bore Elevation and Azimuth Measurement System (Beams) Newly developed laser apparatus verifies that the pointing accuracy requirement of a weapon's fire control system is met.
X